Bitdefender Remote Stack Buffer Overflow via 7z PPMD
http://ift.tt/2tBnSNl
Submitted July 18, 2017 at 06:02PM by landave
via reddit http://ift.tt/2uuR8Kc
http://ift.tt/2tBnSNl
Submitted July 18, 2017 at 06:02PM by landave
via reddit http://ift.tt/2uuR8Kc
landave.io
Bitdefender: Remote Stack Buffer Overflow via 7z PPMD - landave's blog
Blog about anti-virus software and its issues.
NorthSec 2017 Conference Videos have been Published
http://ift.tt/2uEKJwr
Submitted July 18, 2017 at 07:42PM by ouaibe
via reddit http://ift.tt/2u6ahkv
http://ift.tt/2uEKJwr
Submitted July 18, 2017 at 07:42PM by ouaibe
via reddit http://ift.tt/2u6ahkv
NorthSec
NorthSec 2017 Conference Videos - NorthSec
The videos from NorthSec 2017 Conference have finally been published, check them out! Past editions videos are also on our YouTube channel. Want to come to Montreal for NorthSec 2018? The CFP opens in November 2017, mark your calendars & propose something…
WSJ Parent Company Dow Jones Exposed Customer Data, misconfigured S3 bucket
http://ift.tt/2txHTEf
Submitted July 18, 2017 at 07:53PM by Confuzed_
via reddit http://ift.tt/2u53kia
http://ift.tt/2txHTEf
Submitted July 18, 2017 at 07:53PM by Confuzed_
via reddit http://ift.tt/2u53kia
Upguard
Cloud Leak: WSJ Parent Company Dow Jones Exposed Customer Data
Sensitive data points on millions of Dow Jones publication customers were exposed in a massive cloud leak.
GoodSAM CSRF/Stored XSS Chain (Account Compromise/Medical Info Theft).
http://ift.tt/2uyPC9t
Submitted July 18, 2017 at 03:52AM by L1nuxguy
via reddit http://ift.tt/2veBfoG
http://ift.tt/2uyPC9t
Submitted July 18, 2017 at 03:52AM by L1nuxguy
via reddit http://ift.tt/2veBfoG
James Hemmings ~ Blog
GoodSAM – CSRF/Stored XSS Chain Full Disclosure
I’ve been a user of the mobile/web application named “GoodSAM” which is an application where the Ambulance service in London or the East Midlands can dispatch “Responders…
Devil's Ivy Vulnerability
http://ift.tt/2uFbel8
Submitted July 18, 2017 at 09:13PM by ncrmn
via reddit http://ift.tt/2tmJilS
http://ift.tt/2uFbel8
Submitted July 18, 2017 at 09:13PM by ncrmn
via reddit http://ift.tt/2tmJilS
Senrio
Devil's Ivy: The Technical Details
Devil's Ivy is a vulnerability deep in the communication layer. When we began a security analysis of an Axis security camera, we had no idea we would find a vulnerability that affects so many devices. Read on for the technical writeup.
Formal verification of the WireGuard protocol using Tamarin Prover
http://ift.tt/2urREbS
Submitted July 18, 2017 at 08:47PM by zx2c4
via reddit http://ift.tt/2vy9RkP
http://ift.tt/2urREbS
Submitted July 18, 2017 at 08:47PM by zx2c4
via reddit http://ift.tt/2vy9RkP
Wireguard
Formal Verification - WireGuard
Real-World Rubber Ducky Attacks with Empire Stagers
http://ift.tt/2vylTuH
Submitted July 18, 2017 at 09:46PM by sc0tfree
via reddit http://ift.tt/2u6G30L
http://ift.tt/2vylTuH
Submitted July 18, 2017 at 09:46PM by sc0tfree
via reddit http://ift.tt/2u6G30L
sc0tfree
Real-World Rubber Ducky Attacks with Empire Stagers
Nine times out of ten, my goal when using a Rubber Ducky on pentests is to
launch an Empire or Meterpreter session. However, for the Ducky to type out
an entire stager often takes too much time to be practical for most
real-world USB attacks. This article…
launch an Empire or Meterpreter session. However, for the Ducky to type out
an entire stager often takes too much time to be practical for most
real-world USB attacks. This article…
Implementing Malware Command and Control Using Major CDNs and High-Traffic Domains
http://ift.tt/2tn0gRf
Submitted July 18, 2017 at 10:05PM by jat0369
via reddit http://ift.tt/2u5b97i
http://ift.tt/2tn0gRf
Submitted July 18, 2017 at 10:05PM by jat0369
via reddit http://ift.tt/2u5b97i
CyberArk
Implementing Malware Command and Control Using Major CDNs and High-Traffic Domains - CyberArk
Technical research from CyberArk Labs and Red Team security experts to help you think like an attacker by keeping you ahead of the latest threats.
Vendor-exclusive DDNS - is it a security risk?
http://ift.tt/2tn7p46
Submitted July 17, 2017 at 09:54PM by kilgotrout
via reddit http://ift.tt/2vyKEXp
http://ift.tt/2tn7p46
Submitted July 17, 2017 at 09:54PM by kilgotrout
via reddit http://ift.tt/2vyKEXp
Medium
Vendor-exclusive DDNS — is it a security risk?
Opinions expressed are solely my own and do not express the views or opinions of my employer. Information is provided for educational…
Six Security Vulnerabilities from a Year of HackerOne
http://ift.tt/2sl3wfx
Submitted July 19, 2017 at 02:15AM by hash_salts
via reddit http://ift.tt/2u6X8HW
http://ift.tt/2sl3wfx
Submitted July 19, 2017 at 02:15AM by hash_salts
via reddit http://ift.tt/2u6X8HW
Flexport Engineering
Six Security Vulnerabilities from a Year of HackerOne
We launched our HackerOne program a year ago to increase the security of Flexport.
A Security Audit of Firefox Accounts
http://ift.tt/2uzXzLH
Submitted July 19, 2017 at 02:02AM by jvehent
via reddit http://ift.tt/2tDSayR
http://ift.tt/2uzXzLH
Submitted July 19, 2017 at 02:02AM by jvehent
via reddit http://ift.tt/2tDSayR
Mozilla Security Blog
A Security Audit of Firefox Accounts
To provide transparency into our ongoing efforts to protect your privacy and security on the Internet, we are releasing a security audit of Firefox Accounts ...
Setting up a burner phone number using Twilio and 9 lines of code
http://ift.tt/2vAyZaJ
Submitted July 19, 2017 at 10:15AM by xxdesmus
via reddit http://ift.tt/2to899f
http://ift.tt/2vAyZaJ
Submitted July 19, 2017 at 10:15AM by xxdesmus
via reddit http://ift.tt/2to899f
Making and breaking things.
Quickly setting up a burner phone number using Twilio
Firstly the advice in this article is not designed for people who are trying to evade spying or some other stuff, it's just to avoid marketers or avoid giving your number to someone you don't want to. So I'm going over to the states at the end of this week
How to Create the Ultimate Fake Access Point [Walkthrough]
http://ift.tt/2vfY0IU
Submitted July 19, 2017 at 12:31PM by rootsh3ll
via reddit http://ift.tt/2te5731
http://ift.tt/2vfY0IU
Submitted July 19, 2017 at 12:31PM by rootsh3ll
via reddit http://ift.tt/2te5731
rootsh3ll
The Ultimate Fake Access Point [Walkthrough] - rootsh3ll
Overview Assuming that you are capable of setting up a fake access point and setup Apache configuration accordingly to fool victim(s) I am beginning this walk-through. In this scenario, we are using one wireless adapter and an Ethernet connection (under VM)…
New cache architecture on Intel I9 and Skylake server: An initial assessment
http://ift.tt/2u7qOTL
Submitted July 19, 2017 at 04:09PM by maxxori
via reddit http://ift.tt/2uyIMkF
http://ift.tt/2u7qOTL
Submitted July 19, 2017 at 04:09PM by maxxori
via reddit http://ift.tt/2uyIMkF
cyber.wtf
New cache architecture on Intel I9 and Skylake server: An initial assessment
Intel has introduced the new I9 CPU which is seen as HEDT (High-End-DeskTop) product. The micro architecture is in many respects shared with the new Skylake server micro architecture.I f his…
VBScript Injection via GNOME Thumbnailer
http://ift.tt/2tjkawh
Submitted July 19, 2017 at 04:52PM by campuscodi
via reddit http://ift.tt/2tpgpWo
http://ift.tt/2tjkawh
Submitted July 19, 2017 at 04:52PM by campuscodi
via reddit http://ift.tt/2tpgpWo
reddit
VBScript Injection via GNOME Thumbnailer • r/netsec
1 points and 0 comments so far on reddit
Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards
http://ift.tt/2tFG3Bt
Submitted July 19, 2017 at 06:14PM by skeeto
via reddit http://ift.tt/2viNMrb
http://ift.tt/2tFG3Bt
Submitted July 19, 2017 at 06:14PM by skeeto
via reddit http://ift.tt/2viNMrb
Ioactive
Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards
By Thomas Kilbride Not that long ago, motorized hoverboards were in the news – according to widespread reports, they had a tendency to c...
Red Teaming Tips by Vincent Yiu
http://ift.tt/2vC13dP
Submitted July 19, 2017 at 07:10PM by 14cmddr
via reddit http://ift.tt/2uIA2cm
http://ift.tt/2vC13dP
Submitted July 19, 2017 at 07:10PM by 14cmddr
via reddit http://ift.tt/2uIA2cm
Tilting at windmills
Red Teaming Tips by Vincent Yiu
Vincent Yiu has tweeted some really useful red teaming tips. Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Outlook. Red t…
'Atomic fingerprinting' tech could end counterfeit goods
http://ift.tt/2uC3wHV
Submitted July 19, 2017 at 07:40PM by severusssblackkk
via reddit http://ift.tt/2uaa3c9
http://ift.tt/2uC3wHV
Submitted July 19, 2017 at 07:40PM by severusssblackkk
via reddit http://ift.tt/2uaa3c9
Live Science
'Atomic Fingerprinting' Tech Could End Counterfeit Goods
Scientists have developed a new method that can stamp things with "atomic fingerprints" to keep counterfeit goods at bay.
On The (Perceived) Value of EV Certs, Commercial CAs, Phishing and Let's Encrypt
http://ift.tt/2tedxr1
Submitted July 19, 2017 at 09:03PM by striata
via reddit http://ift.tt/2vj5wCH
http://ift.tt/2tedxr1
Submitted July 19, 2017 at 09:03PM by striata
via reddit http://ift.tt/2vj5wCH
Troy Hunt
On The (Perceived) Value of EV Certs, Commercial CAs, Phishing and Let's Encrypt
Last week I wrote about how Life Is About to Get a Whole Lot Harder for Websites Without HTTPS. Somewhere in the comments there, the discussion went off on a tangent about commercial CAs, the threat Let's Encrypt poses to them and subsequently, the value…
NuCypher KMS whitepaper: decentralized key management system. Call for comments and suggestions
http://ift.tt/2uzxqNi
Submitted July 19, 2017 at 10:41PM by michwill
via reddit http://ift.tt/2uD4vaM
http://ift.tt/2uzxqNi
Submitted July 19, 2017 at 10:41PM by michwill
via reddit http://ift.tt/2uD4vaM
Medium
NuCypher KMS: Decentralized key management system
We’re excited to share NuCypher KMS, a decentralized key management system (KMS) for public blockchains.
ARM Exploit Development beginners: "Process Memory and Memory Corruptions (Stack and Heap)"
http://ift.tt/2gLDVH0
Submitted July 20, 2017 at 03:40AM by maxxori
via reddit http://ift.tt/2trM3m7
http://ift.tt/2gLDVH0
Submitted July 20, 2017 at 03:40AM by maxxori
via reddit http://ift.tt/2trM3m7
Azeria-Labs
Process Memory and Memory Corruption